PST: a More Practical Adversarial Learning-based Defense Against Website Fingerprinting

被引:1
|
作者
Jiang, Minghao [1 ,2 ]
Wang, Yong [3 ]
Gou, Gaopeng [1 ,2 ]
Cai, Wei [1 ,2 ]
Xiong, Gang [1 ,2 ]
Shi, Junzheng [1 ,2 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, Beijing, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing, Peoples R China
[3] Coordinat Ctr China, Natl Comp Network Emergency Response Tech Team, Hong Kong, Peoples R China
关键词
Anonymity Communication; Privacy; Website Fingerprinting attack and defense; Deep Learning; Adversarial Machine Learning;
D O I
10.1109/GLOBECOM42002.2020.9322307
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
To prevent serious privacy leakage from website fingerprinting (WF) attacks, many traditional or adversarial WF defenses have been released. However, traditional WF defenses such as Walkie-Talkie (W-T) still generate patterns that might be captured by the deep learning (DL) based WF attacks, which are not effective. Adversarial perturbation based WF defenses better confuse WF attacks, but their requirements for the entire original traffic trace and perturbating any points including historical packets or cells of the network traffic are not practical. To deal with the effectiveness and practicality issues of existing defenses, we proposed a novel WF defense in this paper. called PST. Given a few past bursts of a trace as input, PST Predicts subsequent fuzzy bursts with a neural network, then Searches small but effective adversarial perturbation directions based on observed and predicted bursts, and finally Transfers the perturbation directions to the remaining bursts. Our experimental results over a public closed-world dataset demonstrate that PST can successfully break the network traffic pattern and achieve a high evasion rate of 87.6%, beating W-T by more than 31.59% at the same bandwidth overhead, with only observing 10 transferred bursts. Moreover, our defense adapts to WF attacks dynamically, which could be retrained or updated.
引用
收藏
页数:6
相关论文
共 50 条
  • [21] CMAES-WFD: Adversarial Website Fingerprinting Defense Based on Covariance Matrix Adaptation Evolution Strategy
    Wang, Di
    Zhu, Yuefei
    Fei, Jinlong
    Guo, Maohua
    CMC-COMPUTERS MATERIALS & CONTINUA, 2024, 79 (02): : 2253 - 2276
  • [22] A Practical Website Fingerprinting Attack via CNN-Based Transfer Learning
    Pan, Tianyao
    Tang, Zejia
    Xu, Dawei
    MATHEMATICS, 2023, 11 (19)
  • [23] Adversarial attacks against profile HMM website fingerprinting detection model
    Liu, Xiaolei
    Zhuo, Zhongliu
    Du, Xiaojiang
    Zhang, Xiaosong
    Zhu, Qingxin
    Guizani, Mohsen
    COGNITIVE SYSTEMS RESEARCH, 2019, 54 : 83 - 89
  • [24] More Realistic Website Fingerprinting Using Deep Learning
    Cui, Weiqi
    Chen, Tao
    Chan-Tin, Eric
    2020 IEEE 40TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS), 2020, : 333 - 343
  • [25] WFGUARD: an Effective Fuzzing-testing-based Traffic Morphing Defense against Website Fingerprinting
    Ling, Zhen
    Xiao, Gui
    Luo, Lan
    Wang, Rong
    Xu, Xiangyu
    Liu, Guangchi
    IEEE INFOCOM 2024-IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, 2024, : 441 - 450
  • [26] Deep Reinforcement Learning-Based Adversarial Defense in Vehicular Communication Systems
    Sedar, Roshan
    Kalalas, Charalampos
    Vazquez-Gallego, Francisco
    Alonso-Zarate, Jesus
    ICC 2024 - IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, 2024, : 5250 - 5256
  • [27] An Effective Website Fingerprinting Defense Based on Traffic Splitting and Padding
    Huang, Bin
    Du, Yanhui
    Beijing Ligong Daxue Xuebao/Transaction of Beijing Institute of Technology, 2024, 44 (07): : 750 - 760
  • [28] AttriGuard: A Practical Defense Against Attribute Inference Attacks via Adversarial Machine Learning
    Jia, Jinyuan
    Gong, Neil Zhenqiang
    PROCEEDINGS OF THE 27TH USENIX SECURITY SYMPOSIUM, 2018, : 513 - 529
  • [29] FriendlyFoe: Adversarial Machine Learning as a Practical Architectural Defense against Side Channel Attacks
    Nam, Hyoungwook
    Pothukuchi, Raghavendra Pradyumna
    Li, Bo
    Kim, Nam Sung
    Torrellas, Josep
    PROCEEDINGS OF THE 2024 THE INTERNATIONAL CONFERENCE ON PARALLEL ARCHITECTURES AND COMPILATION TECHNIQUES, PACT 2024, 2024, : 338 - 350
  • [30] Minipatch: Undermining DNN-Based Website Fingerprinting With Adversarial Patches
    Li, Ding
    Zhu, Yuefei
    Chen, Minghao
    Wang, Jue
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 2437 - 2451